ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Maven
GHSA-p4q6-qxjx-8jgp
Directory Traversal in spring-boot-actuator-logview
### Impact The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal expl...
{'CVE-2021-21234'}
2022-03-03T05:13:40.104264Z
2021-01-05T17:29:40Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21234', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772', 'https://github.com/lukashinsch/spring-boot-ac...
null
{'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6'}
{'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772'}
Maven
GHSA-c8hm-7hpq-7jhg
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.
{'CVE-2018-19362'}
2022-03-03T05:12:53.415813Z
2019-01-04T19:07:03Z
HIGH
null
{'CWE-502'}
{'http://www.securityfocus.com/bid/107985', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8...
null
{'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}
{'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}
Maven
GHSA-j3f7-7rmc-6wqj
Improper certificate management in AWS IoT Device SDK v2
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified eithe...
{'CVE-2021-40831'}
2022-03-03T05:14:12.538986Z
2021-11-24T20:35:03Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.co...
null
{'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d'}
{'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186'}
Maven
GHSA-rcvx-rmvf-mxch
Cross-site Scripting in Eclipse Hawkbit
In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client.
{'CVE-2020-27219'}
2022-03-03T05:13:16.547284Z
2022-02-09T22:19:44Z
MODERATE
null
{'CWE-79'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289', 'https://github.com/eclipse/hawkbit/issues/1067', 'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27219'}
null
{'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9'}
{'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9'}
Maven
GHSA-q485-j897-qc27
Moderate severity vulnerability that affects com.mchange:c3p0
c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
{'CVE-2018-20433'}
2022-03-03T05:13:58.482425Z
2019-01-07T19:14:34Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/', 'https://github.com/advisories/GHSA-q485-j897-qc27', 'https://github.com/zhutougg/c3p0', 'https://lists...
null
{'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'}
{'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'}
Maven
GHSA-jrg3-qq99-35g7
Deserialization of Untrusted Data in Jodd
Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set.
{'CVE-2018-21234'}
2022-04-26T18:01:55.893226Z
2022-02-10T23:03:26Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/rdce006b282e56c5cc73cdf452c51c5097154d0503396d62f48abbeae@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf458683390d6650b26a2c8ba8ad396e038e520ad1cc3f3f1e20514d9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r317aec95c436848233047af7ecb3c...
null
{'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16'}
{'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16'}
Maven
GHSA-grc3-8q8m-4j7c
Improper privilege handling in Apache Accumulo
Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security funct...
{'CVE-2020-17533'}
2022-03-03T05:14:10.252302Z
2022-02-09T22:37:59Z
HIGH
null
{'CWE-732', 'CWE-280'}
{'http://www.openwall.com/lists/oss-security/2020/12/29/1', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17533', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f...
null
{'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4'}
{'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4'}
Maven
GHSA-qcj7-g2j5-g7r3
In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a sign...
{'CVE-2016-1000342'}
2022-04-27T13:30:06.880260Z
2018-10-17T16:24:12Z
HIGH
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342', 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927...
null
{'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9'}
{'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9'}
Maven
GHSA-6vqp-h455-42mr
Uncontrolled Memory Allocation in Apache PDFBox
A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.
{'CVE-2021-27906'}
2022-04-22T18:30:22.909055Z
2021-05-13T22:30:13Z
MODERATE
null
{'CWE-789'}
{'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-5112', 'https://lists.fedoraproject.org/archives/list/...
null
{'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f'}
{'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f'}
Maven
GHSA-72m5-fvvv-55m6
Observable Differences in Behavior to Error Inputs in Bouncy Castle
In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short pay...
{'CVE-2020-26939'}
2022-03-03T05:12:45.225730Z
2021-04-22T16:16:49Z
MODERATE
null
{'CWE-203'}
{'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1', 'https://security.netapp.com/advisory/ntap-20201202-0005/', 'https://lists.debian.org/debian-lts-announce/20...
null
{'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1'}
{'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1'}
Maven
GHSA-wx5j-54mm-rqqq
HTTP request smuggling in io.netty:netty-codec-http
### Impact Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward th...
{'CVE-2021-43797'}
2022-04-22T15:47:44.975474Z
2021-12-09T19:09:17Z
MODERATE
null
{'CWE-444'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323', 'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq', 'https://security.netapp.com/advisory/ntap-20220107-0003/', 'https://github.com/netty/netty/pull/11891', ...
null
{'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'}
{'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'}
Maven
GHSA-5pv7-hx9m-8jh3
Missing permission checks in Jenkins Publish Over FTP Plugin
Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
{'CVE-2022-29051'}
2022-05-05T16:18:16.198799Z
2022-04-13T00:00:16Z
MODERATE
null
{'CWE-862'}
{'https://github.com/jenkinsci/publish-over-ftp-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'}
null
{'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}
{'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}
Maven
GHSA-vjw7-6gfq-6wf5
Path Traversal in Eclipse Vert
In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working direct...
{'CVE-2019-17640'}
2022-03-03T05:13:34.325224Z
2022-02-10T20:28:57Z
CRITICAL
null
{'CWE-22', 'CWE-23'}
{'https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416', 'https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E'...
null
{'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4'}
{'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4'}
Maven
GHSA-f92j-qf46-p6vm
Reflected Cross-site Scripting in ACS Commons
### Impact ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vu...
{'CVE-2021-21028'}
2022-03-03T05:12:54.085750Z
2021-02-02T15:46:52Z
HIGH
null
{'CWE-79', 'CWE-416'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/acrobat/apsb21-09.html', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://nvd.nist.gov/vuln/detail/C...
null
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
Maven
GHSA-rcjj-h6gh-jf3r
Information Disclosure in Apache Groovy
Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods ment...
{'CVE-2020-17521'}
2022-04-22T18:30:45.285392Z
2020-12-09T19:03:03Z
MODERATE
null
{'CWE-379'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E', 'https://gr...
null
{'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28'}
{'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28'}
Maven
GHSA-rmr5-cpv2-vgjf
Denial of Service by injecting highly recursive collections or maps in XStream
### Impact The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. ### Patches XStream 1.4.19 monitors and accumulates the time it takes t...
{'CVE-2021-43859'}
2022-04-22T15:47:34.675024Z
2022-02-01T00:48:15Z
HIGH
null
{'CWE-502', 'CWE-400'}
{'https://github.com/x-stream/xstream/security/advisories/GHSA-rmr5-cpv2-vgjf', 'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846', 'http://www.openwall.com/lists/oss-security/2022/02/09/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/messag...
null
{'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846'}
{'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846'}
Maven
GHSA-645p-88qh-w398
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
{'CVE-2018-14718'}
2022-03-03T05:12:37.404567Z
2019-01-04T19:06:55Z
CRITICAL
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://ac...
null
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
Maven
GHSA-v9j2-q4q5-cxh4
No CSRF protection on the password change form
### Impact It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki. ### Patches The problem has been patched in XWiki 12.10.5, 13.2RC1. ### Workarounds It's possible to apply the patch manually by modifying the `register_macros.vm` template like in https://github.c...
{'CVE-2021-32730'}
2021-07-02T16:41:31Z
2021-07-02T19:19:13Z
MODERATE
null
{'CWE-352'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32730', 'https://jira.xwiki.org/browse/XWIKI-18315', 'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'}
null
{'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'}
{'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'}
Maven
GHSA-6jv7-28mv-qp9c
Missing permission check in Jenkins autonomiq Plugin
A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
{'CVE-2022-25195'}
2022-05-04T20:59:04Z
2022-02-16T00:01:23Z
MODERATE
null
{'CWE-862'}
{'https://github.com/jenkinsci/autonomiq-plugin', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25195'}
null
{'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}
{'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}
Maven
GHSA-3rhm-67j6-42jq
Moderate severity vulnerability that affects com.jason-goodwin:authentikat-jwt_2.12
A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validatio...
{'CVE-2017-18239'}
2022-03-03T05:13:53.187473Z
2018-11-09T17:50:40Z
CRITICAL
null
null
{'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0', 'https://github.com/jasongoodwin/authentikat-jwt/issues/12', 'https://github.com/jasongoodwin/authentikat-jwt', 'https://github.com/jasongoodwin/authentikat-jwt/pull/36', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239'...
null
{'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0'}
{'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0'}
Maven
GHSA-338v-3958-8v8r
Information disclosure in JBoss Weld
Race condition in JBoss Weld before 2.2.8 and 3.x before 3.0.0 Alpha3 allows remote attackers to obtain information from a previous conversation via vectors related to a stale thread state.
{'CVE-2014-8122'}
2022-03-03T05:12:41.722214Z
2020-06-10T20:54:15Z
MODERATE
null
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-8122', 'http://rhn.redhat.com/errata/RHSA-2015-0773.html', 'http://rhn.redhat.com/errata/RHSA-2015-0920.html', 'http://rhn.redhat.com/errata/RHSA-2015-0218.html', 'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65', 'http://rhn.redhat.com/errata/RHS...
null
{'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086', 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745', 'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65'}
{'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65', 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745', 'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086'}
Maven
GHSA-pc22-3g76-gm6j
Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory
### Impact On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local ...
{'CVE-2021-21363'}
2022-03-03T05:13:14.024392Z
2021-03-11T03:09:16Z
LOW
null
{'CWE-379', 'CWE-378'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21363', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j', 'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'}
null
{'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'}
{'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'}
Maven
GHSA-r8j4-96mx-rjcc
Improper Restriction of XML External Entity Reference in skylot/jadx
skylot/jadx prior to 1.3.2 is vulnerable to Improper Restriction of XML External Entities when a user is tricked into exporting a malicious APK file (via the -e option) containing a crafted AndroidManifest.xml / strings.xml to gradle, leading to possible local file disclosure.
{'CVE-2022-0219'}
2022-03-03T05:13:21.676040Z
2022-01-21T18:13:42Z
MODERATE
null
{'CWE-611'}
{'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52', 'https://github.com/skylot/jadx', 'https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0219'}
null
{'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52'}
{'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52'}
Maven
GHSA-x3rh-m7vp-35f2
Operation on a Resource after Expiration or Release in Jetty Server
In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads...
{'CVE-2019-17638'}
2022-03-03T05:13:52.159814Z
2020-08-05T14:52:59Z
CRITICAL
null
{'CWE-675', 'CWE-672'}
{'https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r29073905dc9139d0d7a1...
null
{'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba'}
{'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba'}
Maven
GHSA-6h7w-fc84-x7p6
StaticFile.fromUrl can leak presence of a directory
### Impact `StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme...
{'CVE-2021-32643'}
2021-05-27T21:17:06Z
2021-05-28T15:54:39Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32643', 'https://mvnrepository.com/artifact/org.http4s/http4s-core', 'https://github.com/http4s/http4s/security/advisories/GHSA-6h7w-fc84-x7p6', 'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9'}
null
{'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9'}
{'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9'}
Maven
GHSA-673j-qm5f-xpv8
Arbitrary File Write Vulnerability
### Overview The connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers tha...
null
2022-03-03T05:13:55.969503Z
2022-02-16T00:08:18Z
MODERATE
null
null
{'https://github.com/pgjdbc/pgjdbc', 'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8'}
null
{'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'}
{'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'}
Maven
GHSA-wcp5-m52f-mhh5
Improper Restriction of XML External Entity Reference in MPXJ
"MPXJ through 8.1.3 allows XXE attacks. This affects the GanttProjectReader and PhoenixReader components."
{'CVE-2020-25020'}
2022-03-03T05:14:17.857779Z
2021-05-07T15:54:36Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25020', 'https://github.com/joniles/mpxj/releases/tag/v8.1.4'}
null
{'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9'}
{'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9'}
Maven
GHSA-qmqc-x3r4-6v39
Polymorphic deserialization of malicious object in jackson-databind
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using ...
{'CVE-2019-14893'}
2022-03-03T05:13:31.341201Z
2020-05-15T18:59:07Z
HIGH
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2020:0729', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893', 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317', 'https://github.com/FasterXML/jackson-databind/issues/2469', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24...
null
{'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'}
{'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'}
Maven
GHSA-g6v7-vqhx-6v6c
XML External Entity Reference in org.opencms:opencms-core
An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.
{'CVE-2021-3312'}
2022-03-03T05:12:54.278811Z
2021-10-12T17:23:40Z
MODERATE
null
{'CWE-611'}
{'https://github.com/alkacon/opencms-core/issues/721', 'https://github.com/alkacon/opencms-core', 'https://github.com/alkacon/opencms-core/releases', 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312', 'https://github.com/alkacon/o...
null
{'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'}
{'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'}
Maven
GHSA-rfmp-jvr7-hx78
Inadequate Encryption Strength in Apache NiFi
In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to suppor...
{'CVE-2020-9491'}
2022-04-29T20:33:29.094673Z
2022-01-06T20:41:06Z
HIGH
null
{'CWE-327'}
{'https://nifi.apache.org/security#CVE-2020-9491', 'https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E', 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6', 'https://lists.apache.org/thread.html/re48582efe2ac973f8cff...
null
{'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'}
{'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'}
Maven
GHSA-4w82-r329-3q67
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
{'CVE-2020-8840'}
2022-04-07T22:46:58.349234Z
2020-03-04T20:52:14Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%...
null
{'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497'}
{'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b'}
Maven
GHSA-7r83-w6r8-fh6w
Reflected Cross-site Scripting (XSS) in ACS Commons
ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form...
{'CVE-2021-21043'}
2022-03-03T05:13:58.536484Z
2021-05-13T22:31:14Z
MODERATE
null
{'CWE-79', 'CWE-787'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/indesign/apsb21-22.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21043', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons', 'https://github.com/Adobe-Consu...
null
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
Maven
GHSA-q2xp-75m7-gv52
Moderate severity vulnerability that affects net.sf.robocode:robocode.api
Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL.
{'CVE-2019-10648'}
2022-03-03T05:13:20.114776Z
2019-04-02T15:36:49Z
CRITICAL
null
{'CWE-20', 'CWE-862'}
{'https://github.com/advisories/GHSA-q2xp-75m7-gv52', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10648', 'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f', 'https://sourceforge.net/p/robocode/bugs/406/'}
null
{'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'}
{'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'}
Maven
GHSA-36hf-6hp2-9g4c
Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms
In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp.
{'CVE-2019-13237'}
2022-04-19T20:15:09.918154Z
2019-11-12T22:58:14Z
MODERATE
null
{'CWE-200', 'CWE-22'}
{'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'https://aetsu.github.io/OpenCms', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237', 'https://github.com/alkacon/opencms-core'}
null
{'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}
{'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}
Maven
GHSA-2h3j-m7gr-25xj
Excessive Iteration Denial of Service in Apache PDFBox
A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.
{'CVE-2021-27807'}
2022-04-22T18:30:12.280832Z
2021-06-16T17:56:46Z
MODERATE
null
{'CWE-834'}
{'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7...
null
{'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'}
{'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'}
Maven
GHSA-hr32-mgpm-qf2f
Generation of Error Message Containing Sensitive Information in RESTEasy client
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
{'CVE-2020-25633'}
2022-03-11T20:31:57.846588Z
2021-06-03T23:41:34Z
MODERATE
null
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25633', 'https://issues.redhat.com/browse/RESTEASY-2820', 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633'}
null
{'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'}
{'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'}
Maven
GHSA-mh83-jcw5-rjh8
XML External Entity Reference in edu.stanford.nlp:stanford-corenlp
The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks.
{'CVE-2022-0198'}
2022-03-03T05:13:04.921797Z
2022-01-14T21:07:23Z
MODERATE
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0198', 'https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763', 'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d', 'https://github.com/stanfordnlp/corenlp/'}
null
{'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'}
{'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'}
Maven
GHSA-2457-2263-mm9f
Memory leak in micronaut-core
### Impact Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state. ### Patches The problem is patched in Micronaut 3.2.7 and above. ### Workarounds The default content type binder can be replaced in an existing Micronaut ap...
{'CVE-2022-21700'}
2022-03-03T05:11:18.519092Z
2022-01-21T23:19:36Z
MODERATE
null
{'CWE-400'}
{'https://github.com/micronaut-projects/micronaut-core/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21700', 'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f'}
null
{'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'}
{'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'}
Maven
GHSA-2mq8-99q7-55wx
Code injection in keycloak
A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20222'}
2022-03-03T05:12:40.262840Z
2021-05-13T22:29:51Z
HIGH
null
{'CWE-20'}
{'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741', 'https://bugzilla.redhat.com/show_bug.cgi?id=1924606', 'https://access.redhat.com/security/cve/cve-2021-20222', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20222'}
null
{'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'}
{'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'}
Maven
GHSA-v7wg-cpwc-24m4
Unchecked Class Instantiation when providing Plugin Classes
pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. The...
{'CVE-2022-21724'}
2022-04-17T16:46:56.844044Z
2022-02-02T00:04:20Z
HIGH
null
{'CWE-668', 'CWE-74', 'CWE-665'}
{'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4', 'https://security.netapp.com/advisory/ntap-20220311-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724', 'https://lists.fedoraproject.org/archives/list/p...
null
{'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'}
{'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'}
Maven
GHSA-jjhw-5mxp-2g2q
Cross-site Scripting in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateForm...
{'CVE-2021-25933'}
2021-05-28T22:27:50Z
2021-05-25T18:47:01Z
MODERATE
null
{'CWE-79'}
{'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25933', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e', 'https://github.co...
null
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,'}
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'}
Maven
GHSA-9qcf-c26r-x5rf
XML external entity injection in Terracotta Quartz Scheduler
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
{'CVE-2019-13990'}
2022-03-03T05:14:10.554139Z
2020-07-01T17:55:03Z
CRITICAL
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765...
null
{'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'}
{'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'}
Maven
GHSA-88cc-g835-76rp
Improper Restriction of XML External Entity Reference
PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE.
{'CVE-2020-13692'}
2022-03-03T05:13:49.071925Z
2022-02-10T00:30:07Z
HIGH
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/', 'https://lists.apache.org/thread.html/r631f967db6260d61787...
null
{'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'}
{'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'}
Maven
GHSA-mw36-7c6c-q4q2
XStream can be used for Remote Code Execution
### Impact The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14....
{'CVE-2020-26217'}
2022-04-25T23:17:04.652412Z
2020-11-16T20:07:59Z
HIGH
null
{'CWE-78'}
{'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E', 'https://x-stream.github.io/CVE-2020-26217.html', 'https://github.com/x-stream/xstream', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r2d...
null
{'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'}
{'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'}
Maven
GHSA-8fp4-rp6c-5gcv
Path Traversal in com.linecorp.armeria:armeria
### Impact An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. ### Patches Armeria 1.13.4 or above contains the hardened path vali...
{'CVE-2021-43795'}
2022-03-03T05:13:34.204718Z
2021-12-02T22:25:54Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43795', 'https://github.com/line/armeria', 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284', 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv', 'https://github.com/line/armeria/pull/3855'}
null
{'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'}
{'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'}
Maven
GHSA-4vhj-98r6-424h
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed...
{'CVE-2016-1000338'}
2022-04-27T13:30:13.955304Z
2018-10-17T16:23:26Z
HIGH
null
{'CWE-347'}
{'https://github.com/advisories/GHSA-4vhj-98r6-424h', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0', 'https://gith...
null
{'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0'}
{'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0'}
Maven
GHSA-grpf-gg7v-5g5h
SQL Injection in Apache SkyWalking
Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.
{'CVE-2020-13921'}
2022-03-03T05:13:44.746825Z
2021-05-07T15:53:31Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/apache/skywalking/pull/4970', 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951', 'http://www.openwall.com/lists/oss-security/2020/08/05/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921', 'https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919...
null
{'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'}
{'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'}
Maven
GHSA-c265-37vj-cwcc
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
{'CVE-2020-14062'}
2022-03-03T05:12:57.915830Z
2020-06-18T14:44:48Z
HIGH
null
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2704', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterXML/jackson-databind', 'https://snyk.io/vuln/SNYK-JAVA-C...
null
{'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'}
{'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'}
Maven
GHSA-hwvm-vfw8-93mw
Vulnerable dependency in XTDB connector
### Impact The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the conn...
null
2022-03-03T05:13:41.782282Z
2021-12-16T18:53:32Z
MODERATE
null
null
{'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw', 'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15', 'https://github.com/odpi/egeria-connector-xtdb', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}
null
{'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'}
{'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'}
Maven
GHSA-2hjr-fg6c-v2h6
Unauthorized access to Class instance in Jinjava
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
{'CVE-2020-12668'}
2022-03-03T05:13:11.121868Z
2022-02-09T00:33:56Z
MODERATE
null
{'CWE-200'}
{'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4', 'https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava', 'https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4', 'https:...
null
{'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165'}
{'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165', 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b'}
Maven
GHSA-w29m-fjp4-qhmq
Unsafe Identifiers in Opencast
### Impact Opencast allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other loc...
{'CVE-2020-5230'}
2022-03-03T05:13:16.934758Z
2020-01-30T21:21:50Z
MODERATE
null
{'CWE-99'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5230', 'https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq', 'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'}
null
{'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'}
{'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317'}
Maven
GHSA-h353-hc43-95vc
Script injection without script or programming rights through Gadget titles
### Impact A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard. ### Patches The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1. ### Workarounds There's no easy workaround for this issue, it is recommended to upgrade XWiki. #...
{'CVE-2021-32621'}
2022-03-03T05:14:13.346640Z
2021-05-18T18:36:16Z
HIGH
null
{'CWE-94'}
{'https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html', 'https://jira.xwiki.org/browse/XWIKI-17794', 'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32621', 'https://github.com/xwiki/xwiki-platform/security/advisories/...
null
{'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'}
{'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'}
Maven
GHSA-w285-wf9q-5w69
In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
{'CVE-2016-1000352'}
2022-04-27T13:45:07.939306Z
2018-10-17T16:27:38Z
HIGH
null
{'CWE-326'}
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/advisories/GHSA-w285-wf9q-5w69', 'https:/...
null
{'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'}
{'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'}
Maven
GHSA-jj4f-p7vv-j4v9
Arbitrary code execution in Apache Druid
Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary c...
{'CVE-2021-26919'}
2022-03-03T05:14:09.525699Z
2021-06-16T17:51:58Z
HIGH
null
{'CWE-668'}
{'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26919', 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E', 'https://git...
null
{'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'}
{'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'}
Maven
GHSA-2pqj-h3vj-pqgw
Cross-Site Scripting in jquery
Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain ...
{'CVE-2012-6708'}
2022-03-03T05:13:33.982770Z
2020-09-01T16:41:46Z
HIGH
null
{'CWE-64', 'CWE-79'}
{'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'https://l...
null
{'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'}
{'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'}
Maven
GHSA-75p6-52g3-rqc8
Privilege escalation vulnerability on Token Exchange feature
A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
{'CVE-2022-1245'}
2022-05-02T20:02:19.743635Z
2022-04-26T21:21:00Z
MODERATE
null
{'CWE-284'}
{'https://github.com/keycloak/keycloak/security/advisories/GHSA-75p6-52g3-rqc8', 'https://github.com/keycloak/keycloak', 'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'}
null
{'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'}
{'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52'}
Maven
GHSA-378p-hrq3-x4p3
Cross-site scripting in Shopizer
A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL.
{'CVE-2021-33562'}
2022-03-03T05:13:53.531451Z
2021-06-08T23:08:20Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33562', 'https://www.exploit-db.com/exploits/49901', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
null
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
Maven
GHSA-35fg-hjcr-j65f
Information exposure in xwiki-platform
### Impact It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users. ### Patches The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. ### Workarounds There's no easy workaround other than applying the upgrade. ### Re...
{'CVE-2022-23619'}
2022-02-09T21:51:19Z
2022-02-09T21:51:19Z
MODERATE
null
{'CWE-200', 'CWE-640'}
{'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23619', 'https://jira.xwiki.org/browse/XWIKI-18787', 'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'}
null
{'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'}
{'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'}
Maven
GHSA-cghx-9gcr-r42x
Path Traversal in the Java Kubernetes Client
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.
{'CVE-2020-8570'}
2022-03-03T05:13:41.235117Z
2021-01-29T18:12:54Z
MODERATE
null
{'CWE-22'}
{'https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8570', 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd...
null
{'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589'}
{'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589'}
Maven
GHSA-7rpj-hg47-cx62
Improper Restriction of XML External Entity Reference in com.h2database:h2.
H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() meth...
{'CVE-2021-23463'}
2022-04-22T15:47:00.309584Z
2021-12-16T14:29:57Z
HIGH
null
{'CWE-611'}
{'https://github.com/h2database/h2database/pull/3199', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463', 'https://github.com/h2database/h2database/issues/3195', 'https://github.com/h2database/h2database/',...
null
{'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8#diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'}
{'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8#diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'}
Maven
GHSA-8rf5-92jh-3vc9
Uncaught Exception leading to Denial of Service in json-sanitizer
OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations.
{'CVE-2021-23900'}
2022-03-03T05:12:57.380645Z
2021-05-13T22:31:32Z
HIGH
null
{'CWE-248'}
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23900'}
null
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}
Maven
GHSA-6x3v-rw2q-9gx7
Improper implementation of the session fixation protection in Infinispan
A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling.
{'CVE-2019-10158'}
2022-03-03T05:12:57.542880Z
2020-01-21T21:18:44Z
CRITICAL
null
{'CWE-384'}
{'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158', 'https://github.com/infinispan/infinispan/pull/7025', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10158', 'https://github.com/infinispan/infinispan/pull/6960'}
null
{'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72'}
{'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72'}
Maven
GHSA-jc7r-v6fg-2gpf
High severity vulnerability that affects org.apache.cxf:apache-cxf, org.apache.cxf:apache-cxf , and org.apache.cxf:cxf
It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVeri...
{'CVE-2018-8039'}
2022-03-03T05:13:29.834590Z
2018-10-19T16:40:01Z
HIGH
null
{'CWE-755'}
{'http://www.securityfocus.com/bid/106357', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2276', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3...
null
{'https://github.com/apache/cxf/commit/fae6fabf9bd7647f5e9cb68897a7d72b545b741b'}
{'https://github.com/apache/cxf/commit/fae6fabf9bd7647f5e9cb68897a7d72b545b741b'}
Maven
GHSA-vh5c-jqfg-mhrh
Cross-Site Request Forgery in xwiki-platform
### Impact It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tight to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests. ### Pa...
{'CVE-2021-32732'}
2022-02-11T21:08:09Z
2022-02-10T22:42:46Z
HIGH
null
{'CWE-352'}
{'https://jira.xwiki.org/browse/XWIKI-18408', 'https://github.com/xwiki/xwiki-platform/', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32732', 'http...
null
{'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8'}
{'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8'}
Maven
GHSA-ghq2-m3pq-qf3p
Stored XSS in Jenkins CVS Plugin
Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-29037'}
2022-05-03T21:07:01.626408Z
2022-04-13T00:00:18Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617', 'https://github.com/jenkinsci/cvs-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29037'}
null
{'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2'}
{'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2'}
Maven
GHSA-xmw9-q7x9-j5qc
Unbounded connection acceptance leads to file handle exhaustion
### Impact All servers running blaze-core <= 0.14.14, including blaze-http and http4s-blaze-server users, are affected. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incom...
{'CVE-2021-21293'}
2022-03-03T05:09:41.293433Z
2021-02-02T21:42:49Z
HIGH
null
{'CWE-400'}
{'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21293'}
null
{'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1'}
{'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1'}
Maven
GHSA-vwpg-f6gw-rjvf
Incorrect Authorization in Spring Cloud Netflix Zuul
Applications using the “Sensitive Headers” functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the “Sensitive Headers” restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all...
{'CVE-2021-22113'}
2022-03-03T05:12:50.802161Z
2021-05-10T15:18:50Z
MODERATE
null
{'CWE-863'}
{'https://tanzu.vmware.com/security/cve-2021-22113', 'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22113'}
null
{'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'}
{'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07'}
Maven
GHSA-h77f-xxx7-4858
User impersonation due to incorrect handling of the login JWT
### Impact <!--_What kind of vulnerability is it? Who is impacted?_--> This allows anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any Bedrock user. Unless credentials are saved in your configuration, online mode is not affected as users are still requir...
{'CVE-2021-39177'}
2021-09-07T14:04:02Z
2021-09-07T23:04:04Z
HIGH
null
{'CWE-287'}
{'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6', 'https://github.com/GeyserMC/Geyser', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39177', 'https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY', 'https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-485...
null
{'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'}
{'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'}
Maven
GHSA-xhv5-w9c5-2r2w
Unbounded connection acceptance in http4s-blaze-server
### Impact blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each ...
{'CVE-2021-21294'}
2022-03-03T05:13:53.464823Z
2021-02-02T21:42:56Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21294', 'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'}
null
{'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171'}
{'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171'}
Maven
GHSA-4rm3-4mq4-mfwr
Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons
A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful.
{'CVE-2018-20595'}
2022-03-03T05:13:34.121093Z
2019-01-04T17:43:22Z
HIGH
null
{'CWE-352'}
{'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr', 'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2', 'https://github.com/hs-web/hsweb-framework', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20595'}
null
{'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'}
{'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'}
Maven
GHSA-5vcm-3xc3-w7x3
Response Splitting from unsanitized headers
### Impact http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: * Header names (`Header.name`å * Header values (`Header.value`) * Status reason phrases (`Status.reason`) * URI paths (`Uri.Path`) * URI authority registered name...
{'CVE-2021-41084'}
2021-10-21T14:31:24Z
2021-09-22T19:18:41Z
HIGH
null
{'CWE-918'}
{'https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41084', 'https://github.com/http4s/http4s', 'h...
null
{'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8'}
{'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8'}
Maven
GHSA-334p-wv2m-w3vp
Denial of service in Apache Xerces2
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the C...
{'CVE-2009-2625'}
2022-03-03T05:13:12.578512Z
2020-06-15T18:51:30Z
MODERATE
null
null
{'http://www.mandriva.com/security/advisories?name=MDVSA-2011:108', 'http://www.ubuntu.com/usn/USN-890-1', 'http://www.vmware.com/security/advisories/VMSA-2009-0016.html', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html', 'http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.h...
null
{'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b'}
{'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b'}
NuGet
GHSA-h6wf-hvwc-fm77
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-20...
{'CVE-2019-0914'}
2022-03-03T05:13:51.386230Z
2021-03-29T21:00:02Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0914', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0914'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}
NuGet
GHSA-4jqc-8m5r-9rpr
Prototype Pollution in set-value
This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
{'CVE-2021-23440'}
2022-03-30T21:18:05Z
2021-09-13T20:09:36Z
HIGH
null
{'CWE-843', 'CWE-1321'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541', 'https://github.com/jonschlinkert/set-value', 'https://github.com/jonschlinkert/set-value/pull/33', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23440', 'http...
null
{'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452'}
{'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452'}
NuGet
GHSA-w32p-76xr-88pc
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-20...
{'CVE-2019-1003'}
2022-03-03T05:13:43.169665Z
2021-03-29T20:59:06Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003', 'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003'}
null
{'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4'}
NuGet
GHSA-hfm2-fffh-v47v
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197.
{'CVE-2019-1196'}
2022-03-03T05:14:19.261008Z
2021-03-29T20:58:01Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196'}
null
{'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
{'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
NuGet
GHSA-gr4c-5rq6-cgh3
OPC UA applications can allow a remote attacker to determine a Server's private key
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad...
{'CVE-2018-7559'}
2022-04-26T19:15:37.218627Z
2018-10-16T19:58:42Z
MODERATE
null
null
{'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'http://www.securityfocus.com/bid/108688', 'https://github.com/OPCFoundation/UA-.NETStandard', 'https://nvd.nist.gov/vul...
null
{'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150'}
{'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45'}
NuGet
GHSA-8xc6-g8xw-h2c4
YARP Denial of Service Vulnerability
### Impact A denial of service vulnerability exists in how YARP processes input. ### Patches If you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1). If you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1....
{'CVE-2022-26924'}
2022-05-03T17:46:54.173769Z
2022-04-22T20:23:44Z
HIGH
null
null
{'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26924', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26924', 'https://github.com/microsoft/reverse-proxy', 'https://github.com/microsoft/reverse-proxy...
null
{'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38'}
{'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38'}
NuGet
GHSA-ppq7-88c7-q879
Cross-Site Request Forgery in PiranhaCMS
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
{'CVE-2021-25976'}
2022-03-03T05:13:18.933077Z
2021-11-17T23:42:40Z
HIGH
null
{'CWE-352'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25976', 'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda', 'https://github.com/PiranhaCMS/piranha.core'}
null
{'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda'}
{'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda'}
NuGet
GHSA-cwp9-956f-vcwh
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1141'}
2022-03-03T05:14:03.020055Z
2021-03-29T20:57:56Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1141', 'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90'}
null
{'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
{'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
NuGet
GHSA-37pf-w9ff-gqvm
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20...
{'CVE-2019-0927'}
2022-03-03T05:12:47.095852Z
2021-03-29T20:58:59Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0927', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0927', 'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1'}
null
{'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1'}
NuGet
GHSA-vmf5-924f-25f2
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1103'}
2022-03-03T05:13:55.062872Z
2021-03-29T20:59:12Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103'}
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba'}
{'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}
NuGet
GHSA-5rq8-3wvf-wrfg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20...
{'CVE-2019-0933'}
2022-03-03T05:13:40.307258Z
2021-03-29T20:59:01Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0933', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'}
NuGet
GHSA-9735-p6r2-2hgh
Out-of-bounds write
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918.
{'CVE-2019-0911'}
2022-03-03T05:14:13.817901Z
2021-03-29T21:00:00Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0911', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0911'}
null
{'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337'}
NuGet
GHSA-g6j2-ch25-5mmv
Missing Token Replay Detection in Saml2 Authentication services for ASP.NET
### Impact Token Replay Detection is an important defence in depth measure for Single Sign On solutions. In all previous 2.X versions, the Token Replay Detection is not properly implemented. Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use. ### Patches The 2.5....
{'CVE-2020-5261'}
2022-03-03T05:12:39.287527Z
2020-03-25T16:52:49Z
HIGH
null
{'CWE-294'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5261', 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241', 'https://github.com/Sustainsys/Saml2/issues/711', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv'}
null
{'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
{'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
NuGet
GHSA-74r6-grj9-8rq6
Remote Code Execution in AjaxNetProfessional
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
{'CVE-2021-23758'}
2022-03-03T05:14:12.800341Z
2021-12-16T15:27:55Z
CRITICAL
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://...
null
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
NuGet
GHSA-59cj-99cw-rq64
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-20...
{'CVE-2019-0913'}
2022-03-03T05:13:23.375718Z
2021-03-29T21:00:05Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0913', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0913'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}
NuGet
GHSA-8hfj-j24r-96c4
Path Traversal: 'dir/../../filename' in moment.locale
### Impact This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. ### Patches This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive). ### Workarou...
{'CVE-2022-24785'}
2022-04-26T21:00:11.102341Z
2022-04-04T21:25:48Z
HIGH
null
{'CWE-27', 'CWE-22'}
{'https://www.tenable.com/security/tns-2022-09', 'https://github.com/moment/moment', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4'}
null
{'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}
{'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}
NuGet
GHSA-mg98-x2cm-4cpf
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107.
{'CVE-2019-1106'}
2022-03-03T05:13:07.842305Z
2021-03-29T20:59:15Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1106', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46'}
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46'}
{'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}
NuGet
GHSA-6973-94v8-5mgw
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-20...
{'CVE-2019-0991'}
2022-03-03T05:11:51.614144Z
2021-03-29T20:57:42Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0991'}
null
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'}
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'}
NuGet
GHSA-r8hp-5m7c-jhv4
Cross-site Scripting OrchardCore.Application.Cms.Targets
Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.
{'CVE-2022-0274'}
2022-03-03T05:10:01.498753Z
2022-01-21T23:08:50Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0274', 'https://github.com/orchardcms/orchardcore', 'https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764', 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}
null
{'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}
{'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}
NuGet
GHSA-p23j-g745-8449
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366.
{'CVE-2019-1335'}
2022-03-03T05:13:53.507688Z
2021-03-29T20:55:40Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1335', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1335'}
null
{'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27'}
{'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}
NuGet
GHSA-9pq7-rcxv-47vq
Incorrect Regular Expression in RestSharp
RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server ...
{'CVE-2021-27293'}
2022-03-03T05:13:17.456498Z
2021-07-14T19:10:01Z
HIGH
null
{'CWE-697', 'CWE-185'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27293', 'https://restsharp.dev/', 'https://github.com/restsharp/RestSharp/issues/1556', 'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'}
null
{'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'}
{'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'}
NuGet
GHSA-qv8q-v995-72gr
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerabili...
null
2022-03-03T05:12:56.256760Z
2020-09-09T17:29:38Z
LOW
null
null
{'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699', 'https://www.nuget.org/packages/Personnummer/', 'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr'}
null
{'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'}
{'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'}
NuGet
GHSA-2ghc-6v89-pw9j
Prototype Pollution in body-parser-xml
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3666'}
2021-09-14T18:39:31Z
2021-09-14T20:25:35Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/fiznool/body-parser-xml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666', 'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}
null
{'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}
{'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}
NuGet
GHSA-8j9v-h2vp-2hhv
XSS in HtmlSanitizer
### Impact If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. ### Patches The problem has been fixed in versi...
{'CVE-2020-26293'}
2022-03-03T05:12:47.065847Z
2021-01-04T18:22:11Z
LOW
null
{'CWE-79', 'CWE-74'}
{'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26293', 'https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372', 'https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv', 'https://www.nuget.org/packag...
null
{'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8'}
{'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8'}
NuGet
GHSA-88cw-3m6x-49f7
Out-of-bounds Write in ChakraCore
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.
{'CVE-2020-17054'}
2022-03-03T05:13:17.628779Z
2021-08-02T17:25:58Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17054', 'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17054'}
null
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'}
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'}
NuGet
GHSA-pcgf-qjx2-qv4q
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1217'}
2022-03-03T05:14:05.834729Z
2021-03-29T20:56:08Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1217', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217'}
null
{'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}
{'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}
NuGet
GHSA-vpc2-7xmf-ppmf
Out-of-bounds Write in ChakraCore
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054.
{'CVE-2020-17048'}
2022-03-03T05:14:01.644069Z
2021-08-02T17:26:11Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17048', 'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17048'}
null
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'}
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'}
NuGet
GHSA-v648-p92f-9996
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20...
{'CVE-2019-0925'}
2022-03-03T05:14:19.461609Z
2021-03-29T20:57:39Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925', 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8'}
null
{'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8'}